There are so many cases, for example, that you could create a malicious USB and connect it directly to the victim's computer, infect the game crack file or movie, or porn video, or image (some social engineering techniques apply to those three). Or you can cheat and distribute it as a hacking tool.